Skip to content

Commit dbb4664

Browse files
committed
[PLUTO-1411] Add trivy test
1 parent 785fa73 commit dbb4664

File tree

1 file changed

+9
-71
lines changed

1 file changed

+9
-71
lines changed

plugins/tools/trivy/test/expected.sarif

Lines changed: 9 additions & 71 deletions
Original file line numberDiff line numberDiff line change
@@ -5,81 +5,19 @@
55
{
66
"tool": {
77
"driver": {
8+
"fullName": "Trivy Vulnerability Scanner",
89
"name": "Trivy",
9-
"version": "0.59.1",
10-
"informationUri": "https://github.com/aquasecurity/trivy",
11-
"rules": [
12-
{
13-
"id": "CVE-2021-23343",
14-
"shortDescription": {
15-
"text": "Command injection in lodash"
16-
},
17-
"properties": {
18-
"tags": [
19-
"security",
20-
"external/cwe/cwe-78"
21-
],
22-
"precision": "very-high"
23-
}
24-
},
25-
{
26-
"id": "CVE-2020-28500",
27-
"shortDescription": {
28-
"text": "Regular Expression Denial of Service in moment"
29-
},
30-
"properties": {
31-
"tags": [
32-
"security",
33-
"external/cwe/cwe-400"
34-
],
35-
"precision": "very-high"
36-
}
37-
}
38-
]
10+
"rules": [],
11+
"version": "0.59.1"
3912
}
4013
},
41-
"results": [
42-
{
43-
"ruleId": "CVE-2021-23343",
44-
"level": "error",
45-
"message": {
46-
"text": "Command injection in lodash"
47-
},
48-
"locations": [
49-
{
50-
"physicalLocation": {
51-
"artifactLocation": {
52-
"uri": "package.json"
53-
},
54-
"region": {
55-
"startLine": 7,
56-
"startColumn": 5
57-
}
58-
}
59-
}
60-
]
61-
},
62-
{
63-
"ruleId": "CVE-2020-28500",
64-
"level": "error",
65-
"message": {
66-
"text": "Regular Expression Denial of Service in moment"
67-
},
68-
"locations": [
69-
{
70-
"physicalLocation": {
71-
"artifactLocation": {
72-
"uri": "package.json"
73-
},
74-
"region": {
75-
"startLine": 9,
76-
"startColumn": 5
77-
}
78-
}
79-
}
80-
]
14+
"results": [],
15+
"columnKind": "utf16CodeUnits",
16+
"originalUriBaseIds": {
17+
"ROOTPATH": {
18+
"uri": "file:///plugins/tools/trivy/test/"
8119
}
82-
]
20+
}
8321
}
8422
]
8523
}

0 commit comments

Comments
 (0)